{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T09:55:54Z","timestamp":1764842154759,"version":"3.41.0"},"publisher-location":"New York, New York, USA","reference-count":27,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1145\/3267973.3267974","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T12:56:36Z","timestamp":1539694596000},"page":"1-12","source":"Crossref","is-referenced-by-count":58,"title":["Doing Real Work with FHE"],"prefix":"10.1145","author":[{"given":"Jack L. H.","family":"Crawford","sequence":"first","affiliation":[{"name":"Queen Mary Univ. of London, London, United Kingdom"}]},{"given":"Craig","family":"Gentry","sequence":"additional","affiliation":[{"name":"IBM Research, Yorktown Heights, NY, USA"}]},{"given":"Shai","family":"Halevi","sequence":"additional","affiliation":[{"name":"IBM Research, Yorktown Heights, NY, USA"}]},{"given":"Daniel","family":"Platt","sequence":"additional","affiliation":[{"name":"IBM Research, Yorktown Heights, NY, USA"}]},{"given":"Victor","family":"Shoup","sequence":"additional","affiliation":[{"name":"NYU, New York, NY, USA"}]}],"member":"320","reference":[{"key":"key-10.1145\/3267973.3267974-1","doi-asserted-by":"crossref","unstructured":"Yoshinori AONO, Takuya HAYASHI, Le Trieu PHONG, and Lihua WANG. 2016. Privacy-Preserving Logistic Regression with Distributed Data Sources via Homomorphic Encryption. IEICE Transactions on Information and Systems E99.D, 8 (2016), 2079--2089. https:\/\/doi.org\/10.1587\/transinf.2015INP0020","DOI":"10.1587\/transinf.2015INP0020"},{"key":"key-10.1145\/3267973.3267974-2","unstructured":"Anonymized Authors. 2018. Doing Real Work with FHE: The Case of Logistic Regression. Detailed removed for anonimity."},{"key":"key-10.1145\/3267973.3267974-3","doi-asserted-by":"crossref","unstructured":"Dan Boneh, Craig Gentry, Shai Halevi, Frank Wang, and David J. Wu. 2013. Private Database Queries Using Somewhat Homomorphic Encryption. In ACNS (Lecture Notes in Computer Science), Vol. 7954. Springer, 102--118.","DOI":"10.1007\/978-3-642-38980-1_7"},{"key":"key-10.1145\/3267973.3267974-4","doi-asserted-by":"crossref","unstructured":"Zvika Brakerski. 2012. Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP. In CRYPTO (Lecture Notes in Computer Science), Reihaneh Safavi-Naini and Ran Canetti (Eds.), Vol. 7417. Springer, 868--886.","DOI":"10.1007\/978-3-642-32009-5_50"},{"key":"key-10.1145\/3267973.3267974-5","doi-asserted-by":"crossref","unstructured":"Zvika Brakerski, Craig Gentry, and Vinod Vaikuntanathan. 2014. (Leveled) Fully Homomorphic Encryption without Bootstrapping. ACM Transactions on Computation Theory 6, 3 (2014), 13. https:\/\/doi.org\/10.1145\/2633600","DOI":"10.1145\/2633600"},{"key":"key-10.1145\/3267973.3267974-6","doi-asserted-by":"crossref","unstructured":"Hao Chen, Kim Laine, and Rachel Player. 2017. Simple Encrypted Arithmetic Library - SEAL v2.1. In Financial Cryptography Workshops (Lecture Notes in Computer Science), Vol. 10323. Springer, 3--18.","DOI":"10.1007\/978-3-319-70278-0_1"},{"key":"key-10.1145\/3267973.3267974-7","unstructured":"Jingwei Chen, Yong Feng, Yang Liu, and Wenyuan Wu. 2017. Faster Binary Arithmetic Operations on Encrypted Integers. In WCSE'17, Proceedings of 2017 the 7th International Workshop on Computer Science and Engineering."},{"key":"key-10.1145\/3267973.3267974-8","doi-asserted-by":"crossref","unstructured":"Jung Hee Cheon, Andrey Kim, Miran Kim, and Yong Soo Song. 2017. Homomorphic Encryption for Arithmetic of Approximate Numbers. In ASIACRYPT (1) (Lecture Notes in Computer Science), Vol. 10624. Springer, 409--437.","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"key-10.1145\/3267973.3267974-9","doi-asserted-by":"crossref","unstructured":"Jung Hee Cheon, Miran Kim, and Myungsun Kim. 2015. Search-and-compute on encrypted data. In International Conference on Financial Cryptography and Data Security. Springer, 142--159.","DOI":"10.1007\/978-3-662-48051-9_11"},{"key":"key-10.1145\/3267973.3267974-10","doi-asserted-by":"crossref","unstructured":"Ilaria Chillotti, Nicolas Gama, Mariya Georgieva, and Malika Izabach&#232;ne. 2017. Faster Packed Homomorphic Operations and Efficient Circuit Bootstrapping for TFHE. In ASIACRYPT (1) (Lecture Notes in Computer Science), Vol. 10624. Springer, 377--408.","DOI":"10.1007\/978-3-319-70694-8_14"},{"key":"key-10.1145\/3267973.3267974-11","unstructured":"Anamaria Costache, Nigel P. Smart, Srinivas Vivek, and Adrian Waller. 2016. Fixed-Point Arithmetic in SHE Schemes. In SAC (Lecture Notes in Computer Science), Vol. 10532. Springer, 401--422."},{"key":"key-10.1145\/3267973.3267974-12","doi-asserted-by":"crossref","unstructured":"L&#233;o Ducas and Daniele Micciancio. 2015. FHEW: Bootstrapping Homomorphic Encryption in Less Than a Second. In EUROCRYPT (1) (Lecture Notes in Computer Science), Vol. 9056. Springer, 617--640.","DOI":"10.1007\/978-3-662-46800-5_24"},{"key":"key-10.1145\/3267973.3267974-13","unstructured":"Craig Gentry. 2009. Fully homomorphic encryption using ideal lattices. In Proceedings of the 41st ACM Symposium on Theory of Computing -- STOC 2009. ACM, 169--178."},{"key":"key-10.1145\/3267973.3267974-14","doi-asserted-by":"crossref","unstructured":"Craig Gentry, Shai Halevi, Charanjit S. Jutla, and Mariana Raykova. 2015. Private Database Access with HE-over-ORAM Architecture. In ACNS (Lecture Notes in Computer Science), Vol. 9092. Springer, 172--191.","DOI":"10.1007\/978-3-319-28166-7_9"},{"key":"key-10.1145\/3267973.3267974-15","unstructured":"Craig Gentry, Amit Sahai, and Brent Waters. 2013. Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based. In Advances in Cryptology - CRYPTO 2013, Part I, Ran Canetti and Juan A. Garay (Eds.). Springer, 75--92. https:\/\/doi.org\/10.1007\/978--3--642--40041--4_ 5"},{"key":"key-10.1145\/3267973.3267974-16","unstructured":"Ran Gilad-Bachrach, Nathan Dowlin, Kim Laine, Kristin E. Lauter, Michael Naehrig, and John Wernsing. 2016. CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy. In ICML (JMLR Workshop and Conference Proceedings), Vol. 48. JMLR.org, 201--210."},{"key":"key-10.1145\/3267973.3267974-17","doi-asserted-by":"crossref","unstructured":"Shai Halevi and Victor Shoup. 2014. Algorithms in HElib. In CRYPTO (1) (Lecture Notes in Computer Science), Vol. 8616. Springer, 554--571.","DOI":"10.1007\/978-3-662-44371-2_31"},{"key":"key-10.1145\/3267973.3267974-18","doi-asserted-by":"crossref","unstructured":"Shai Halevi and Victor Shoup. 2015. Bootstrapping for HElib. In EUROCRYPT (1) (Lecture Notes in Computer Science), Vol. 9056. Springer, 641--670.","DOI":"10.1007\/978-3-662-46800-5_25"},{"key":"key-10.1145\/3267973.3267974-19","unstructured":"Shai Halevi and Victor Shoup. Accessed September 2014. HElib - An Implementation of homomorphic encryption. https:\/\/github.com\/shaih\/HElib\/."},{"key":"key-10.1145\/3267973.3267974-20","unstructured":"iDASH [n. d.]. Integrating Data for Analysis, Anonymization and SHaring (iDASH). https:\/\/idash.ucsd.edu\/."},{"key":"key-10.1145\/3267973.3267974-21","doi-asserted-by":"crossref","unstructured":"Richard M. Karp and Vijaya Ramachandran. 1990. Parallel Algorithms for Sharedmemory Machines. In Handbook of Theoretical Computer Science (Vol. A), Jan van Leeuwen (Ed.). MIT Press, Cambridge, MA, USA, 869--941. http:\/\/dl.acm.org\/ citation.cfm?id=114872.114889","DOI":"10.1016\/B978-0-444-88071-0.50022-9"},{"key":"key-10.1145\/3267973.3267974-22","doi-asserted-by":"crossref","unstructured":"Alhassan Khedr, P. Glenn Gulak, and Vinod Vaikuntanathan. 2016. SHIELD: Scalable Homomorphic Implementation of Encrypted Data-Classifiers. IEEE Trans. Computers 65, 9 (2016), 2848--2858. https:\/\/doi.org\/10.1109\/TC.2015.2500576","DOI":"10.1109\/TC.2015.2500576"},{"key":"key-10.1145\/3267973.3267974-23","unstructured":"Miran Kim, Yongsoo Song, Shuang Wang, Yuhou Xia, and Xiaoqian Jiang. 2018. Secure Logistic Regression based on Homomorphic Encryption. Cryptology ePrint Archive, Report 2018\/074. https:\/\/eprint.iacr.org\/2018\/074."},{"key":"key-10.1145\/3267973.3267974-24","doi-asserted-by":"crossref","unstructured":"Tancr&#232;de Lepoint and Pascal Paillier. 2013. On the minimal number of bootstrappings in homomorphic circuits. In International Conference on Financial Cryptography and Data Security. Springer, 189--200.","DOI":"10.1007\/978-3-642-41320-9_13"},{"key":"key-10.1145\/3267973.3267974-25","doi-asserted-by":"crossref","unstructured":"Payman Mohassel and Yupeng Zhang. 2017. SecureML: A System for Scalable Privacy-Preserving Machine Learning. In 2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22--26, 2017. IEEE Computer Society, 19--38. https:\/\/doi.org\/10.1109\/SP.2017.12","DOI":"10.1109\/SP.2017.12"},{"key":"key-10.1145\/3267973.3267974-26","unstructured":"ShuangWang, Yuchen Zhang,Wenrui Dai, Kristin Lauter, Miran Kim, Yuzhe Tang, Hongkai Xiong, and Xiaoqian Jiang. 2016. HEALER: homomorphic computation of ExAct Logistic rEgRession for secure rare disease variants analysis in GWAS. Bioinformatics 32, 2 (2016), 211--218. https:\/\/doi.org\/10.1093\/bioinformatics\/ btv563"},{"key":"key-10.1145\/3267973.3267974-27","unstructured":"Chen Xu, Jingwei Chen, Wenyuan Wu, and Yong Feng. 2016. Homomorphically Encrypted Arithmetic Operations Over the Integer Ring. In Information Security Practice and Experience, Feng Bao, Liqun Chen, Robert H. Deng, and GuojunWang (Eds.). Springer International Publishing, Cham, 167--181. https:\/\/ia.cr\/2017\/387."}],"event":{"number":"6","sponsor":["SIGSAC, ACM Special Interest Group on Security, Audit, and Control"],"acronym":"WAHC '18","name":"the 6th Workshop","start":{"date-parts":[[2018,10,15]]},"location":"Toronto, Canada","end":{"date-parts":[[2018,10,19]]}},"container-title":["Proceedings of the 6th Workshop on Encrypted Computing &amp; Applied Homomorphic Cryptography - WAHC '18"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3267973.3267974","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=3267974&ftid=2008841&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:18Z","timestamp":1750212438000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=3267973.3267974"}},"subtitle":["The Case of Logistic Regression"],"proceedings-subject":"Encrypted Computing & Applied Homomorphic Cryptography","short-title":[],"issued":{"date-parts":[[2018]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1145\/3267973.3267974","relation":{},"subject":[],"published":{"date-parts":[[2018]]}}}